CVE-2025-7812
WordPress · WordPress Video Share VOD – Turnkey Video Site Builder Script plugin
**A high-severity Cross-Site Request Forgery (CSRF) vulnerability in the Video Share VOD WordPress plugin could allow an attacker to trick a site administrator into performing unauthorized actions, po.
Executive summary
A high-severity Cross-Site Request Forgery (CSRF) vulnerability in the Video Share VOD WordPress plugin could allow an attacker to trick a site administrator into performing unauthorized actions, potentially leading to a site takeover.
Vulnerability
The plugin is vulnerable to Cross-Site Request Forgery (CSRF). An unauthenticated attacker can craft a malicious link or web page and trick a logged-in administrator into clicking it. This action would execute commands on the WordPress site with the administrator's privileges without their knowledge.
Business impact
This vulnerability is rated 8.8 (High) on the CVSS scale. A successful exploit could allow an attacker to perform any action the administrator is capable of, such as changing plugin settings, creating new admin accounts, or injecting malicious code into the site. This can result in complete site compromise, data theft, or the distribution of malware to site visitors, causing significant reputational and operational damage.
Remediation
Immediate Action: Update the Video Share VOD plugin to the latest patched version immediately. If no patch is available, disable and uninstall the plugin until a fix is released.
Proactive Monitoring: Review website audit logs for any unexpected or unauthorized changes made by administrative accounts. Scan website files for any signs of malicious code injection or newly created user accounts.
Compensating Controls: Ensure all administrative users are trained to recognize and avoid phishing attempts. A Web Application Firewall (WAF) with robust CSRF protection rules may provide a layer of defense.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The high severity of this CSRF flaw poses a serious risk to the integrity of affected WordPress sites. Administrators must take immediate action by updating or removing the vulnerable plugin. Failing to do so leaves the site exposed to a potential full compromise through social engineering attacks.